client.c (072035eba1ceb87a987cc03d756fc2da3f3ba058) | client.c (cb8d4c8f54b8271f642f02382eec29d468bb1c77) |
---|---|
1/* 2 * Copyright (C) 2005 Anthony Liguori <anthony@codemonkey.ws> 3 * 4 * Network Block Device Client Side 5 * 6 * This program is free software; you can redistribute it and/or modify 7 * it under the terms of the GNU General Public License as published by 8 * the Free Software Foundation; under version 2 of the License. --- 359 unchanged lines hidden (view full) --- 368 369 TRACE("Getting TLS reply from server"); 370 if (read_sync(ioc, &length, sizeof(length)) != sizeof(length)) { 371 error_setg(errp, "failed to read option length"); 372 return NULL; 373 } 374 length = be32_to_cpu(length); 375 if (length != 0) { | 1/* 2 * Copyright (C) 2005 Anthony Liguori <anthony@codemonkey.ws> 3 * 4 * Network Block Device Client Side 5 * 6 * This program is free software; you can redistribute it and/or modify 7 * it under the terms of the GNU General Public License as published by 8 * the Free Software Foundation; under version 2 of the License. --- 359 unchanged lines hidden (view full) --- 368 369 TRACE("Getting TLS reply from server"); 370 if (read_sync(ioc, &length, sizeof(length)) != sizeof(length)) { 371 error_setg(errp, "failed to read option length"); 372 return NULL; 373 } 374 length = be32_to_cpu(length); 375 if (length != 0) { |
376 error_setg(errp, "Start TLS reponse was not zero %x", | 376 error_setg(errp, "Start TLS response was not zero %x", |
377 length); 378 return NULL; 379 } 380 381 TRACE("TLS request approved, setting up TLS"); 382 tioc = qio_channel_tls_new_client(ioc, tlscreds, hostname, errp); 383 if (!tioc) { 384 return NULL; --- 361 unchanged lines hidden --- | 377 length); 378 return NULL; 379 } 380 381 TRACE("TLS request approved, setting up TLS"); 382 tioc = qio_channel_tls_new_client(ioc, tlscreds, hostname, errp); 383 if (!tioc) { 384 return NULL; --- 361 unchanged lines hidden --- |